Wed.Jan 11, 2017

article thumbnail

McKinsey finds hard work to do in Big Data Revisited report

Computer Weekly

The McKinsey Global Institute has revisited its path-breaking 2011 big data report, finding a new salience for machine learning, and most companies under-capitalising their data

Big Data 157
article thumbnail

Mapping the Customer Journey

IT Toolbox

Every interaction between your company and a customer can be viewed as a journey. To provide the best possible service to your customer you need to understand the steps in the journey and what you can do to improve your customer's overall experience. A useful tool to understand the process is a customer journey map.

Tools 154
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security concerns push Asian organisations to adopt managed and hybrid IT services

Computer Weekly

Security needs are persuading organisations in Asia Pacific to adopt managed IT, and hybrid services are crucial for digital transformation, according to a CenturyLink study

Security 141
article thumbnail

Microsoft, Qualcomm, Citi Join Israeli Cyber Syndicate

Data Center Knowledge

Group of Israeli military vets has raised more than $92 million, plans to launch two companies this year Read More.

Microsoft 154
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

BBC’s iPlayer will be overhauled by 2020

Computer Weekly

Broadcaster BBC aims to redesign its digital iPlayer service by 2020 to better reflect the needs of the content rental and streaming environment

142
142
article thumbnail

What's the Shelf-Life of a Wi-Fi Network Design?

IT Toolbox

Wireless network design is a combination of knowing how WLAN technology works, the ability to understand the environment that the WLAN will be deployed in, experience, and critical thought. Good tools help, as does a sound methodology. But each of these has enough non-precision to them to result in more than one right way of doing a survey for a given area.

Network 126

More Trending

article thumbnail

Get ready for the rise of spymail, the hottest trend in email hacking

Tech Republic Security

A dramatic spike in malicious email code that monitors user behavior used in phishing attacks has cost business over $3 billion in recent years. Learn how to discover who's snooping on your email.

Trends 119
article thumbnail

Australian websites defaced by Tunisian Islamist hacktivists

Computer Weekly

Tunisian Islamist hacktivists have defaced websites in Australia, Russia, Italy and Pakistan with messages calling for a halt to the killing of civilians in Syria

123
123
article thumbnail

Speed and Flexibility Will Shape the Future of Critical Infrastructure

Data Center Knowledge

As more vendors develop critical infrastructure expertise, design and engineering and sophisticated project management, data center development times will shorten and the industry will become more agile in its ability to react to large shifts in demand. Read More.

article thumbnail

Tech focus helps Singapore go second in globalisation index

Computer Weekly

Singapore is the second most globalised economy in the world and its IT infrastructure is critical to this achievement

141
141
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Geeky ways to celebrate Friday the 13th

Network World

You're in luck We've cobbled together a slew of things for the geeky among you to do on Jan. 13 -- Friday the 13 th that is th. And we suggest you do it up because you won’t get another chance until Oct. 13, 2017. Don’t miss the day! Mobile apps exist solely for the purpose of reminding you when Friday the 13 th is coming up. Pocketkai’s free iOS app will remind you of the one to three Friday the 13ths coming up each year for the next 50 years.

Mobile 116
article thumbnail

Lease vs. Buy: Is Your ERP Solution in the Sky or Onsite?

IT Toolbox

The latest trends in ERP solutions are cloud-based and SaaS systems. Comparing benefits and costs of these options to those of onsite solutions is akin to the "lease vs. buy" scenario. See what each offers to determine where your ERP solutions reside. Decisions, Decisions.

Trends 116
article thumbnail

How To Hold On To Your Best IT Workers

The Accidental Successful CIO

Hiring the best workers is just the start, now you have to get them to stay Image Credit: Matt McGee. I guess if you take the time to think about it, being the person with the CIO job is a lot like being the coach of a football team. You think about the players that you need, you interview a lot of people, pick a few of them to join your team , and then the season starts.

How To 116
article thumbnail

Firms should take note of EC privacy proposals, warns KPMG

Computer Weekly

Professional services firm KPMG is urging UK firms to ensure they are prepared for proposed EU privacy rules for electronic communications set to become law by May 2018

115
115
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Generation Z and Collaboration - What Comes After Millennials

IT Toolbox

Seems apropos to start off 2017 by looking at what’s coming in terms of changing workforce demographics. This is the year that Generation Z starts entering the workforce, and just when you thought you had Millennials figured out, you may soon need to do another re-set around meeting workplace needs.

Meeting 109
article thumbnail

GDPR compliance is top priority for Belgian CIOs in 2017

Computer Weekly

GDPR, cloud computing and a lack of IT skills are some of the challenges that CIOs in Belgium will address this year

Cloud 134
article thumbnail

Digital Realty Signals the Gloves are Coming Off in 2017

Data Center Knowledge

After two years of austerity, the REIT is planning to spend up to $1B on data center construction this year Read More.

article thumbnail

Asean storage moves towards hybrid model

Computer Weekly

Storage is moving to the cloud in the Asean region and a number of storage companies are jostling for position

Storage 137
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Why the age of connected cars presents a 'very real threat' in cybersecurity

Tech Republic Security

At NAIAS 2017, experts in data management and cybersecurity discussed the risks that come with the 'internet of cars.' Here's what you should know.

Internet 113
article thumbnail

Deloitte predicts major advances in mobile technology in 2017

Computer Weekly

Deloitte’s 16th TMT Predictions report highlights advances in mobile networking and device technology

Mobile 134
article thumbnail

Fluid Vs. Classic Plus

IT Toolbox

Starting with PeopleTools release 8.56 Oracle will be adding a new stylesheet called Classic Plus. Classic Plus (or ?Classic+?). This new style sheet allows the basic classic components to look more like Fluid components.

Oracle 100
article thumbnail

Beware of Oracle’s developer Trojan

Computer Weekly

The Oracle Technology Network allows developers to prototype applications for free, but there is a catch when it is time to deploy

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Amazon Echo murder case raises IoT privacy questions for enterprise users

Tech Republic Security

Police in Arkansas want to access an alleged murderer's Amazon Echo recordings, raising new privacy issues around the Internet of Things.

article thumbnail

World Economic Forum warns of AI business risk

Computer Weekly

Ahead of its annual meeting in Davos, the World Economic Forum warns that artificial intelligence needs strong governance

article thumbnail

Panzura Raises $32M to Make Cloud Storage Feel Like On-Prem NAS

Data Center Knowledge

Company’s technology combines hyperscale cloud storage services with in-house storage networks Read More.

Storage 118
article thumbnail

Building society uses SharePoint in the cloud for intranet

Computer Weekly

The Family Building Society moves intranet to SharePoint in its first major cloud project

Cloud 126
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Report: AWS Quietly Acquired Cybersecurity Firm Harvest.ai

Data Center Knowledge

Investor says cloud giant already selling startup's tech but remains silent about it in public Read More.

Report 116
article thumbnail

How to create and use templates in Google Inbox

Tech Republic Cloud

Google Inbox users, you'll be happy to know there is a templates tool built into the app. Discover how to use this handy templates feature for custom signatures, canned replies, and more.

Google 90
article thumbnail

Windows 10 snooping: Microsoft will harvest less data but still awaits nod from watchdog

Tech Republic Security

Microsoft dials back data collection in its flagship OS but one privacy watchdog is still assessing whether the changes go far enough.

Microsoft 102
article thumbnail

‘Found a nasty bug in my (Cisco) ASA this morning’

Network World

The above headline on a post to Reddit piqued my interest this afternoon because it was in that site’s section devoted to system administration and those people know a bug when they encounter one. The Redditor elaborates: “I found a bug in my ASA today. Eth 0/2 was totally unusable and seemed ‘blocked.’ These Cisco bugs are really getting out of hand.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.